Login / Signup
Digital signature with message recovery using self-certified public keys without trustworthy system authority.
Ya-Fen Chang
Chin-Chen Chang
Hui-Feng Huang
Published in:
Appl. Math. Comput. (2005)
Keyphrases
</>
digital signature
private key
smart card
public key
secret key
key management
security mechanisms
signature scheme
elliptic curve
public key infrastructure
data integrity
secure communication
digital copyright protection
distributed databases
security requirements
standard model